From Security Weekly Wiki
Revision as of 21:26, 2 April 2020 by Paul Asadoorian (talk | contribs) (Added By Paul's Craptastic PPWorks Code)
Jump to navigationJump to search

Paul's Security Weekly Episode 645 - 2020-04-02

Episode Audio

Paul's Security Weekly Episode 645


  • Is your Open Source code secure? Learn how to verify your code during development, not after the build in our next webcast with Synopsys. Register for our upcoming webcasts or virtual trainings by visiting You can also access our on-demand library of previously recorded webcasts/trainings by visiting Each webcast will earn you 1 CPE credit that we will submit on your behalf if you provide your ISC2 number.
  • We have officially migrated our mailing list to BACK to our original platform! We have our categories nailed down and you are now able to customize what you receive from us based on your preferences by visiting and clicking the button to join the list! Once you have joined, you will also be able to go back and update your "interests" so that we can grow with you as you progress through your journey in InfoSec!
  • We are looking for high-quality guest suggestions for our Enterprise Security Weekly podcast to fill our upcoming recording schedule! We're committed to educating and providing entertainment for the InfoSec community and we would love to hear from you about who you would like us to interview on the show! Submit your suggestions for guests by visiting and submitting the form! We review suggestions monthly and will reach out to you once reviewed!
  • Join Qualys for VMDR Live on April 21 at 2pm ET for a live demonstration of the game-changing Vulnerability Management, Detection & Response offering - a unified solution that integrates vulnerability management, threat prioritization and patching in a single app. Register at

Interview: Collaboration between NetOps and SecOps in today's world - 6:00-6:45PM


Matt and Paul will discuss how interaction between network engineers and security operations has changed over the years, as well as the value of the network when identifying security threats and performing remediation.

Guest: Bio:
Matt Allen is Senior Solutions Engineer at VIAVI Solutions]
Matt Allen is a Senior Solutions Engineer at VIAVI Solutions. Prior to his 8 years at VIAVI, Matt has garnered 20 years of experience in the network engineering and telecommunications space. He holds the following certifications: Amazon Cloud Practictioner, Microsoft Certified Solutions Expert, Cisco Certified Network Associate, Certified Novell Engineer, and most recently Certified Ethical Hacker.


Jeff Man - Sr. InfoSec Consultant at Online Business Systems
Larry Pesce - Senior Managing Consultant and Director of Research at InGuardians
Lee Neely - Senior Cyber Analyst at Lawrence Livermore National Laboratory
Paul Asadoorian - Founder & CTO at Security Weekly
Tyler Robinson - Managing Director of Network Operations at Nisos, Inc

Interview: IoT Devices: Security and Privacy Labels Research - 6:00-6:45PM


At Carnegie Mellon University we are designing a usable security and privacy label for smart devices to help consumers make informed choices about Internet of Things device purchases and encourage manufacturers to disclose their privacy and security practices. The label includes information on privacy and security practices of the smart device, such as the type of data the device collects and whether or not the device gets automatic security updates. Based on research with both consumers and experts, we have designed a two-layer label that includes a simple, understandable primary layer for consumers and a more detailed secondary layer that includes information important to experts.

Guest: Bio:
Lorrie Cranor is Director, CyLab Security and Privacy Institute at Carnegie Mellon University
Lorrie Faith Cranor is the Director and Bosch Distinguished Professor in Security and Privacy Technologies of CyLab and the FORE Systems Professor of Computer Science and of Engineering and Public Policy at Carnegie Mellon University. She also directs the CyLab Usable Privacy and Security Laboratory (CUPS) and co-directs the MSIT-Privacy Engineering masters program.


Jeff Man - Sr. InfoSec Consultant at Online Business Systems
Larry Pesce - Senior Managing Consultant and Director of Research at InGuardians
Lee Neely - Senior Cyber Analyst at Lawrence Livermore National Laboratory
Paul Asadoorian - Founder & CTO at Security Weekly
Tyler Robinson - Managing Director of Network Operations at Nisos, Inc

News - Security News - TBD


Security News - TBD

Jeff Man's Content:

  1. New Release: Tribe of Hackers Security Leaders getting the shameless plug out of the way - but genuinely a good read
  2. Marriott says 5.2 million guest records were stolen in another data breach Nothing to see here/no PCI data compromised
  3. Introduce Kids to Cybersecurity With This Free Activity Book the kids are home anyway - might as well make them hackers
  4. Notification of Enforcement Discretion for Telehealth Remote Communications During the COVID-19 Nationwide Public Health Emergency

Larry Pesce's Content:

  1. Zoombombing is a thing
  2. Wardialing for Zoom meetings - Nice work Trent Lo!
  3. When geofencing goes wrong

Lee Neely's Content:

  1. Spy Group Used 5 Zero-Days to Hack North Koreans phishing attacked used to exploit IE, Chrome and Windows zero-day vulnerabilities to conduct watering hole attacks.
  2. Dharma Ransomware source for sale on Hacking Forums Dharma is based on Crysis, and a tool was released in February to allow decryption without paying the ransom.
  3. Hackers taking advantage of Zoom's popularity to push Malware Hackers impersonate Zoom related sites to entice users to install unwanted/malicious add-ons and software.
  4. Marriott Data Breach exposes data of 52 million guests Contact, stay preference, affiliations and personal data ripe for phishing exposed.
  5. 'Zoom-bombing': FBI warns some teleconferencesconferences, online classrooms vulnerable to hackers Remember to secure your VTC, Zoom or otherwise, make them private, require a password and check attendees.
  6. PoC Exploits for CVE-2020-0796 (SMBGhost) Privilege Escalation flaw published SMBGhost is high risk wormable attack. Neither PoC code enable wormable behavior.
  7. 'Secure' Backup company leaks 135 million records online Los Angeles based SOS Oneline Backup customer information database misconfigured. Exposed data includes user names. email, phone, business details, along with backup system structure. May run afoul of CCPA and GDPR regulations.
  8. Your Social Security Number Costs $4 on The Dark Web Report by Atlas VPN finds that for $4 you can get SSN, full name, drivers's license, passport number and email address. Pricing depends on victim's credit score.

Paul Asadoorian's Content:

Zoom Stories

  1. Two Zoom Zero-Day Flaws Uncovered
  2. Trojanized Zoom Apps Target Remote Workers | SecurityWeek.Com
  3. Zoom Removes Data-Mining LinkedIn Feature
  4. War Dialing Tool Exposes Zooms Password Problems Krebs on Security
  5. Good Apps Behaving Badly: Zoom macOS Installer - VMRay
  6. Zoom iOS App Sends Data to Facebook Even if You Dont Have a Facebook Account
  7. Zoom Zero Day: 4+ Million Webcams & maybe an RCE? Just get them to visit your website!
  8. Jitsi Meet on Docker - We are testing this here, but only because we can control the network flows, e.g. we can stand up servers and clients and have them connect directly rather than bouncing through other people's servers. I have not done a security assessment yet. It was not security that drove us to test it out, in fact, I am worried about how tightly maintained WE can keep it, vs. having an entire team like Zoom or Microsoft.

Non-Zoom Stories

  1. Millions of routers running OpenWRT vulnerable to attack
  2. Uncovering OpenWRT remote code execution (CVE-2020-7982)
  3. Marriott Was Hacked -- Again - Schneier on Security
  4. Ex-NSA hacker drops new zero-day doom for Zoom TechCrunch
  5. Nvidia's Next-Generation GPUs Could Destroy Xbox Series X If Leaks Are True | Digital Trends
  6. CVE-2020-0796

Video Chat Client Vulnerability History

  1. Skype Technologies Skype : List of security vulnerabilities
  2. Zoom : Security vulnerabilities
  3. Cisco Webex : List of security vulnerabilities
  4. Skype Skype : List of security vulnerabilities
  5. Microsoft Skype : List of security vulnerabilities

Tyler Robinson's Content:

Template:PSW645NewsTyler Robinson